Which of the following is used to ensure information integrity?

a. Auditing
b. Digital signatures
c. Backups
d. Passwords


ANS: B

Computer Science & Information Technology

You might also like to view...

Files that are read by the computer are called ____ files.

A. output B. readOnly C. writeOnly D. input

Computer Science & Information Technology

A ________ is approximately one thousand bytes

A) terabyte B) megabyte C) byte D) kilobyte

Computer Science & Information Technology

Data structures are part of an ADT’s ______.

a) definition b) implementation c) specifications d) usage

Computer Science & Information Technology

The minimum number of times a loop can iterate is

a. 1 b. 5 c. 0 d. -1

Computer Science & Information Technology